At least according to the Department of Homeland Security...
In a restricted intelligence document distributed to police, public safety, and security organizations in July, the Department of Homeland Security warned of a “malicious activity”
that could expose secrets and security vulnerabilities in
organizations’ information systems. The name of that activity: “Google
dorking.”
“Malicious cyber actors are using advanced search techniques,
referred to as ‘Google dorking,’ to locate information that
organizations may not have intended to be discoverable by the public or
to find website vulnerabilities for use in subsequent cyber attacks,”
the for-official-use-only Roll Call Release warned. “By searching for
specific file types and keywords, malicious cyber actors can locate
information such as usernames and passwords, e-mail lists, sensitive
documents, bank account details, and website vulnerabilities.”
That’s right, if you’re using advanced operators for search on Google,
such as “site:arstechnica.com” or “filetype:xls,” you’re behaving like a
“malicious cyber actor.” Some organizations will react to you accessing
information they thought was hidden as if you were a cybercriminal, as
reporters at Scripps found out last year. Those individuals were accused of “hacking” the website of free cellphone provider TerraCom
after discovering sensitive customer data openly accessible from the
Internet via a Google search and an “automated “ hacking tool: GNU’s
Wget.
But this warning from the DHS and the FBI was mostly intended to give
law enforcement and other organizations a sense of urgency to take a
hard look at their own websites’ security. Local police departments have
increasingly become the target of “hacktivists.” Recent examples
include attacks on the Albuquerque Police Department’s network in March
following the shooting of a homeless man and attacks on St. Louis
County police networks in response to the recent events in Ferguson,
Missouri.
Read the full article @
arstechnica.
yikes
ReplyDelete